Cryptographic software

Results: 2705



#Item
401Cryptographic software / Identity management / Password / Internet privacy / FileVault / Privacy / Keystroke logging / Password strength / Password manager / Cryptography / Ethics / Espionage

PDF Document

Add to Reading List

Source URL: www.unitedagainstracism.org

Language: English - Date: 2013-11-22 09:08:32
402Computer security / Internet / Email authentication / Public-key cryptography / PGP / Pretty Good Privacy / Email / Cincinnatus / Encryption / Cryptography / Internet privacy / Cryptographic software

Metropolitan Books Henry Holt and Company, LLC Publishers sinceFifth Avenue New York, New Yorkwww.henryholt.com

Add to Reading List

Source URL: us.macmillan.com

Language: English - Date: 2015-04-28 11:19:09
403Bitcoin / Peer-to-peer computing / Financial cryptography / Cryptographic protocols / Electronic commerce / Electronic money / Gold coin / United States dollar / Snark / Computing / Graph theory / Software

Zerocash: Decentralized Anonymous Payments from Bitcoin (extended version) Eli Ben-Sasson∗ Alessandro Chiesa†

Add to Reading List

Source URL: zerocash-project.org

Language: English
404Windows NT / Microsoft CryptoAPI / CryptGenRandom / Windows / Cryptographic Service Provider / Security and safety features new to Windows Vista / AES implementations / Microsoft Windows / Software / Cryptographic software

Microsoft Word - Enhanced Cryptographic Provider (rsaenh dll) SP.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-17 16:20:38
405Computing / Password / European Insurance and Occupational Pensions Authority / FreeOTFE / On-the-fly encryption / Email / Database / System software / Cryptographic software / Disk encryption / Software

CEIOPS-QIS5November 2010 Process for analysing group data in QIS5 - main characteristics -

Add to Reading List

Source URL: eiopa.europa.eu

Language: English - Date: 2015-05-04 10:37:08
406Network architecture / Internet protocols / Computer network security / Secure communication / Cryptographic software / Transport Layer Security / Virtual private network / IPsec / HTTP Secure / Cryptographic protocols / Computing / Data

White_paper_secure_protocolsFINAL

Add to Reading List

Source URL: www.insidesecure.com

Language: English
407Electronic commerce / PKCS / RSA / Cryptographic software / Cryptography / Public-key cryptography / Advanced Encryption Standard

SECURE MICROCONTROLLER   SOLUTIONS Applications •  Internet of Things •  Energy and Water

Add to Reading List

Source URL: www.insidesecure.com

Language: English
408Cryptographic software / Business / Federated identity / Identity management systems / System software / Computer security / Password / Invoice / Internet privacy

Guide My.tentoo for clients General In this guide we explain on a step-by-step basis all the possibilities that my.tentoo offers you as a client.

Add to Reading List

Source URL: www.tentoo.nl

Language: English - Date: 2014-08-08 16:03:39
409Crypt / SHA-1 / BATON / Key generation / Cryptographic software / NSA cryptography / SHA-2 / Cryptography / Key management / Cryptographic hash functions

MYK-85 Key Management Unit A complete, 32-bit RISC-based cryptographic processor with Baton, DES, and Triple DES in

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:38
410Software / Cryptographic software / Password / LastPass Password Manager / Internet protocols / Internet standards / Secure Shell / Computer security / File Transfer Protocol / Security / Identity management / Computing

Introduction to backups and security by Suzette Franck September 5, 2012

Add to Reading List

Source URL: speakerd.s3.amazonaws.com

Language: English - Date: 2014-09-05 14:28:54
UPDATE